“Internet Safety for Kids” A Presentation for Adults

Document Sample
“Internet Safety for Kids” A Presentation for Adults Powered By Docstoc
					  “Internet Safety for
         Kids”
           A
Presentation for Adults
        Introduction




          Certified Ethical Hacker
        Certified Linux Professional
      Master Certified Novell Engineer

             Currently Pursuing
“Certified Hacking and Forensic Investigator”
How and Why I’m here today
    Seminar “Key Point” Outline
► Google   Reconnaissance / Primer / Content
  Filtering
► Dangers of My Space / Facebook / Chat Rooms
► How Spam is created
► Phishing Scams
► Identity Theft Prevention
► Home Computer Protection
► CyberBullying (Rate my Teachers)
► Internet Safety for Kids
                What on earth is a
            Certified Ethical Hacker ??
►   The Certified Ethical Hacker (CEH) certification is a professional
    certification provided by the International Council of E-Commerce
    Consultants (in short, EC-Coucil)

►   The definition of an Ethical Hacker is very similar to a Penetration
    Tester. The Ethical Hacker is an individual who is usually employed
    with the organization and who can be trusted to undertake an attempt
    to penetrate networks and/or computer systems using the same
    methods as a Hacker. Illegal hacking (ie; cracking computer systems)
    is a felony in Canada and most other countries. But when this type of
    hacking is done by request and under a contract between an Ethical
    Hacker and an organization, it is legal. The most important point is
    that an Ethical Hacker has authorization to probe the target.

►   A Certified Ethical Hacker is a skilled professional who understands and
    knows how to look for the weaknesses and vulnerabilities in target
    systems and uses the same knowledge and tools as a malicious
    hacker. Be Thankful we’re on your side ☺
     How can you become a CEH ?
►   Certification coursework : The coursework consists of
    22 modules of subject matter. Module times range from 30
    minutes to up to five hours, or more, depending on the
    depth of the information provided.

►   Examination : Certification is achieved through training at
    an ATC (Accredited Training Center) or self-study. In order
    to sit for the exam you must fill out an application and also
    have documented 2 years of information security work
    experience. The exam consists of 150 multiple-choice
    questions, and students are given up to 3 or 4 hours, to
    complete the examination. The exam costs US$250, and is
    administered via computer at an EC-Council Accredited
    Training Center.
       Let’s Begin !! GOOGLE.com
        Name Searching Basics

► 1. Did you know ?: Google contains 8 Billion
  webpages but caches only 800 Million
► 2. Use the whole name to get the broadest search.
  Remember their may be middle initials.
► 3.Search for names backwards, and search for
  variants. Names in lists are often last, first.
► 4.If you are getting too many results use
  “quotes”around the name.
► •“john smith”or “smith john”
           Homework Assignment
           You must be kidding !!
► Go   to Google.ca and Select Preferences
Name search without Quotes
Name Search with quotes
Deeper Searching
      Some sites to see (More
           Homework)

► Myfamily.com    (ancestry.com)
► Anybirthday.com
► Eliyon.com
► With these three sources available, names,
  addresses, phone numbers and dates of
  birth are available on almost ANYONE!
  Parents don’t let parents let their
   kids join MySpace or Facebook
► Parents  need to look / Learn about myspace
  and facebook.
► Kids don’t think before they post. Once the
  information is submitted, it’s very hard to
  take it off.
► Kids promoting an image that won’t do
  them any favors.
► Kids blog too much information.
► Kids site isn’t set to Private
  Myspace / Facebook Video Demo



http://www.msnbc.msn.com/id/11064451/

This video is 6m38s long
       Dangers of Chat rooms
► Prepare  your kids just like the real world
► Anyone can be anyone on Cyberspace
► Children wastes a lot of time chatting
  instead of doing homework
► Participants in chat rooms will sometimes
  attempt to entice children into talking about
  sex in one form or another.
► Children can also be in danger of under-
  developing their social skills
 Phishing Scams with a side dish of
              Spam


► V1AGRA_4_LESS       online
► Rolex Watches for Cheap
► Get Pharma grade drugs online for cheaper
► Enlarge your Privates
  Phishing Scams with a side dish of
             Spam (Cont)
Subject Line : Evidential less ohmmeter

Hello, Your refinance application has been accepted.
We are ready to give you a loan.
There is no obligation and this is a FREE quote
*Debt Consolidation.
*Refinancing.
*Second Mortgage.
*Equity Line of Credit.
*First Purchase.
Visit here for more information Expect to be contacted within
   24 Hours.
http://livhjing.com
    Phishing Scams with a side dish of
               Spam (Cont)
►   Nigerian letter Scam

DEAR SIR,
    URGENT AND CONFIDENTIAL BUSINESS PROPOSAL
    I AM MARIAM ABACHA, WIDOW OF THE LATE NIGERIAN HEAD OF STATE, GEN. SANI
    ABACHA. AFTER HE DEATH OF MY HUSBAND WHO DIED MYSTERIOUSLY AS A RESULT OF
    CARDIAC ARREST, I WAS INFORMED BY OUR LAWYER, BELLO GAMBARI THAT, MY
    HUSBAND WHO AT THAT TIME WAS THE PRESIDENT OF NIGERIA, CALLED HIM AND
    CONDUCTED HIM ROUND HIS APARTMENT AND SHOWED HIM FOUR METAL BOXES
    CONTAINING MONEY ALL IN FOREIGN EXCHANGE AND HE EQUALLY MADE HIM BELIEVE
    THAT THOSE BOXES ARE FOR ONWARD TRANSFER TO HIS OVERSEAS COUNTERPART
    FOR PERSONAL INVESTMENT.
    ALONG THE LINE, MY HUSBAND DIED AND SINCE THEN THE NIGERIAN GOVERNMENT
    HAS BEEN AFTER US, MOLESTING, POLICING AND FREEZING OUR BANK ACCOUNTS AND
    EVEN MY ELDEST SON RIGHT NOW IS IN DETENTION. MY FAMILY ACCOUNT IN
    SWITZERLAND WORTH US$22,000,000.00 AND 120,000,000.00 DUTCH MARK HAS BEEN
    CONFISCATED BY THE GOVERNMENT. THE GOVERNMENT IS INTERROGATING HIM (MY
    SON MOHAMMED) ABOUT OUR ASSET AND SOME VITAL DOCUMENTS. IT WAS IN THE
    COURSE OF THESE, AFTER THE BURIAL RITE AND CUSTOMS, THAT OUR LAWYER SAW
    YOUR NAME AND ADDRESS FROM THE PUBLICATION OF THE NIGERIAN BUSINESS
    PROMOTION AGENCY. THIS IS WHY I AM USING THIS OPPORTUNITY TO SOLICIT FOR
    YOUR CO-OPERATION AND ASSISTANCE TO HELP ME AS A VERY SINCERE RESPONSIBLE
    PERSON. I HAVE ALL THE TRUST IN YOU AND I KNOW THAT YOU WILL NOT SIT ON THIS
    MONEY.
Phishing Scams with a side dish of
           Spam (cont)
I HAVE SUCCEEDED IN CARRYING THE FOUR METAL BOXES OUT OF THE
COUNTRY, WITH THE AID OF SOME TOP GOVERNMENT OFFICIAL, WHO STILL
SHOW SYMPATHY TO MY FAMILY, TO A NEIGHBOURING COUNTRY (ACCRA-
GHANA) TO BE PRECISE. I PRAY YOU WOULD HELP US IN GETTING THIS
MONEY TRANSFERRED OVER TO YOUR COUNTRY. EACH OF THESE METAL
BOXES CONTAINS US$5,000,000.00 (FIVE MILLION UNITED STATES DOLLARS
ONLY) AND TOGETHER THESE FOUR BOXES CONTAIN
US20,000,000.00(TWENTY MILLION UNITED STATESDOLLARS ONLY). THIS
IS ACTUALLY WHAT WE HAVE MOVED TO GHANA.
THEREFORE, I NEED AN URGENT HELP FROM YOU AS A MAN OF GOD TO HELP
GET THIS MONEY IN ACCRA GHANA TO YOUR COUNTRY. THIS MONEY, AFTER
GETTING TO YOUR COUNTRY, WOULD BE SHARED ACCORDING TO THE
PERCENTAGE AGREED BY BOTH OF US.PLEASE NOTE THAT THIS MATTER IS
STRICTLY CONFIDENTIAL AS THE GOVERNMENT WHICH MY LATE HUSBAND
WAS PART OF IS STILL UNDER SURVAILLANCE TO PROBE US.
YOU CAN CONTACT ME THROUGH MY FAMILY LAWYER AS INDICATED ABOVE
AND ALSO TO LIAISE WITH HIM TOWARDS THE EFFECTIVE COMPLETION OF
THIS TRANSACTION ON TEL/FAX N0:xxx-x-xxxxxxx AS HE HAS THE
MANDATE OF THE FAMILY TO HANDLE THIS TRANSACTION.
THANKS AND BEST REGARD
MRS. MARIAM ABACHA
              What is Spam ?
► Example  you get an email with subject
  important alert, but it’s really a loose 10 pounds
  in 5 days for 39$

► Microsoft which operates No. 2 Internet service
  provider MSN plus e-mail service Hotmail, says it
  blocks an average of 2.4 billion spams per day. An
  average of about 80 per person per day.

► My   employer blocks about 700,000
 How Spammers Get Addresses

► They get them from Newsgroups,
 Chatrooms, and AOL users who leave their
 email as their display name . Another way
 is to Hack using dictionary.

► Asit turns out, there are hundreds of
 companies that will sell you CDs filled with
 millions of valid e-mail addresses
        How is the Spam actually
              distributed ?
►   If you wanted to send a lot of spam, then there are a
    number of companies set up to send "bulk e-mail." The
    largest of these companies are able to send billions of
    spam e-mail messages a day. They increasingly operate
    out of foreign countries to avoid U.S. laws and lawsuits
    trying to block spam

►   Once the big companies send out 500,000 spam email and
    get shutdown, an new company that takes over the
    address cannot send email.

►   Spoofing @company address in the "From:" field,

►   Sobig virus and Zombies
           How to Stop Spam
► E-mail   addresses generally are not private
 (just like your phone number is not private
 if it is listed in the phone book). Once a
 spammer gets a hold of your e-mail address
 and starts sharing it with other spammers,
 you are likely to get a lot of spam.

► Content   filtering
Where is the Spam originating ?
     Properties of the http://livhjing.com
                     eMail
Return-path: <ebqsi@gmail.com>
Received: from OLYMPUS.gmail.com ([72.14.205.17])
    by ronride.us.gmail.com with ESMTP; Sat, 09 Jun 2007 10:01:05 -0600
Received: from banicne.imafex.sk (banicne.imafex.sk [215.215.100.100]) by
    OLYMPUS.gmail.com (TMA SMTPRS 4.4.568.0) with SMTP id
 <C0092849731@OLYMPUS.gmail.com> for <jedi31337@gmail.com>; Sat, 9 Jun 2007
    10:02:28 -0600
Received-SPF: none (OLYMPUS.gmail.com: domain of ebqsi@gmail.com does notdesignate
    any permitted senders)
X-IADB2: None
X-Bonded-Senders: None
X-Habeas: None
X-Cloudmark-Rating: 0 <127.0.50.0>
X-IDDB: None
X-Modus-ReverseDNS: OK
X-Modus-BlackList: 215.215.100.100=OK;ebqsi@gmail.com=OK
X-Modus-RBL: 215.215.100.100=OK
X-Modus-Trusted: 215.215.100.100=NO
X-Modus-Audit: FALSE;0;0;0
Return-path: <ebqsi@gmail.com>
Email Tracker Pro Results
   How do Spammer Get our eMail
            address ?
► Purchase    it from other Spammers

► Collect   it themselves

► You   could easily become a spammer yourself



Spider demo
               Identity Theft
► Identitytheft occurs when somebody steals
 your name and other personal information
 for fraudulent purposes. Identity theft is a
 form of identity crime (where somebody
 uses a false identity to commit a crime).

► Not   the same as debit Card fraud
     Tips to Prevent Identity Theft
                (1 of 8)
Watch what you carry

  Open your wallet or purse and empty all its contents on a
  table to have a good look at what confidential and personal
  information you are actually carrying with you. The
  following items should stay at home in a safe location:
  • Social insurance card
  • Passport
  • Birth certificate
  • Any other cards with your social insurance number as an
  account number, such as a private health insurance card
      Tips to Prevent Identity Theft
                 (2 of 8)
Shred all documents instead of putting it in the trash.

  If you want to throw away documents that contain account
  numbers or other personal information, shred them first. In
  fact, criminals could still piece together shredded
  documents if they are very eager, so consider purchasing a
  cross-cut shredder. While that might seem extreme,
  consider that over 60 per cent of a person’s identity can be
  found in his or her garbage can.
  Worse yet, it is not illegal to venture into someone else’s
  trash if it is in a public area.
     Tips to Prevent Identity Theft
                (3 of 8)
Keep your PIN private
► In recent years, card duplication has been on the
  rise — so, for instance, if at a gas station the card
  reader was switched out for a writer, your card
  could be copied. While the particle strip on the
  back of the card does not contain your PIN, the
  thieves could try to find a way to get it. In fact,
  the latest technology they are using is an ATM
  keypad with a keylogger built in that record your
  password.
► WiFi is now involved
► Plans to have “Chip Cards” this year
       Tips to Prevent Identity Theft
                  (4 of 8)
Good deals are not always what they seem
► Ever heard of caller ID spoofing?


► Using Vonage or any Voice over Internet Protocol
  (VoIP) service, criminals can use an open-source
  software program to have any number they want
  appear on a caller ID display.

► If you receive a call from a person claiming to be a
  telemarketer, trying to sell you something that
  seems too good to be true, ask for a number and
  call back before purchasing
     Tips to Prevent Identity Theft
                (5 of 8)
Don’t fall for the phish
► Another common form of fraud is the “phishing
  scam.” Let’s say, for example, you receive an e-
  mail from eBay asking you to update your
  personal information. The link appears to be a
  valid eBay web address, but if you view the
  source, it is actually another IP address that looks
  exactly like the real eBay.

► Abuse@thatwebsite.com
    Tips to Prevent Identity Theft
               (6 of 8)
Shopper’s paradise

 Sometimes we want to take advantage of
 “online only” specials, and look to make a
 purchase online. Having a credit card with a
 relatively small limit (say $250 to $500)
 instead of using your major card is a good
 way to protect yourself if the sale is too
 goodto be true. This ensures that if your
 information is captured by criminals, they
 won’t have access to too much money.
     Tips to Prevent Identity Theft
                (7 of 8)
Keep tabs on your information
Canadians are able to order copies of their credit
  reports from Equifax and Trans Union Canada for
  about $15 to $20. These reports contain all the
  financial and credit history a person owns —
  including credit cards, loans, lines of credit — as
  well as phone numbers for the institutions that
  granted these.
      Tips to Prevent Identity Theft
                 (8 of 8)
Here are a few more tips to keep you, and your
  identity, safer
► Your PIN is your electronic signature. Don't write it down
  — memorize it.
► When selecting a PIN, avoid the obvious — this would
  include your name, phone number, birthday, and address.
► Never disclose your PIN to anyone. No one but you is
  legally allowed to use it, including your spouse. No one
  from a legitimate financial institution, police service or
  business should ever ask for your PIN.
► After completing a transaction, remember to take your
  bank card and your transaction record. Once you are done
  with the transaction paper, shred it.
                   Cyber Bullying
►   "Cyberbullying" is when a child, preteen or teen is
    tormented, threatened, harassed, humiliated, embarrassed
    or otherwise targeted by another child, preteen or teen
    using the Internet, interactive and digital technologies or
    mobile phones

►   Once adults become involved, it is plain and simple cyber-
    harassment or cyberstalking. Adult cyber-harassment or
    cyberstalking is NEVER called cyberbullying.

►   Children have killed each other and committed suicide after
    having been involved in a cyberbullying incident.
 Cyber Bullying / Rate my Teachers

► Honest,   Essential Critique

► http://www.ratemyteachers.ca/
    Home Computer Protection
► Windows      Firewalls
► Anti-virus
► Spyware   Detectors
Spyware Search and Destroy
Windows Defender
IE 7 with Identity Guard / FireFox is less
  hackable.
Don’t install any P2P software
► http://www.microsoft.com/protect
                SafeKeeper
 What is it ?

► All-in-onecomputer protection. Block porn,
 gambling, drugs and millions of dangerous
 websites. Everything you need to keep your
 family safe online — and guard them from
 online predators. iParenting Media Awards
 just awarded SafeKeeper the Best Parental
 Control Product of 2007!
         Features of SafeKeeper
► Predator  Alert : Know exactly where
 registered sex offenders live in your
 neighborhood. If new predators move to
 your area, Safekeeper will send e–mail
 alerts to you, including their name, photo &
 address.

► Logs   all instant messaging conversations
 Features of SafeKeeper (Cont)
► Time Controls : You control when your
 kids can, or can’t use the computer. Set the
 hours when they can go online, or use chat
 and instant messenger

► Remote  Monitoring: Check your home
 computer from anywhere in the world.
 Change your computer settings, even when
 you’re away from home.
  Features of SafeKeeper (Cont)
► KidSafe  Blocker: Blocks porn, gambling,
 violence, drugs
Quick Break
 Internet Safety for
        Kids
   (a presentation for adults)


Who is Most at Risk to Online Predators
  Online Victimization Techniques
       How to Protect Your Kids
   www.ethicalhackerguy.ca/kids
        jedi31337@gmail.com
               Warning
► Viewer   discretion advised
   This is a disturbing topic
   This presentation was NOT designed to be
   viewed by children
              The Statistics

►1 in 5 children are sexually solicited or
 approached over the Internet in a one-year
 period of time. [Online Victimization: A Report
 on the Nation’s Youth]


► 20%  of violent offenders serving time in
 state prisons reported having victimized a
 child. [Source: U.S. Department of Justice]
            Contents

►Sample  Cases
►Cold Hard Facts about Technophilia
►Cyber Child Sex Offender Terminology
►Six Steps to Luring
►Cyber Child Sex Offender Profiles
►Most At-Risk
►Advice for Parents
►Resources
              Kylie Taylor Case
► Detectives said Kylie (14) arranged to meet Sadler
  through Internet chat rooms and phone calls after she
  left her foster home.
► Court documents said Kylie was found in a darkened
  room with video cameras and restraints where he
  whipped, sexually assaulted her and chained her to a
  bed when he left the residence.
► Stanley Scott Sadler, age 47, has been charged with one
  count of kidnapping in the first degree, three counts of
  rape of a child in the third degree, and one count of
  sexual exploitation of a minor.
► Kylie was located by her mother and an ad hoc group of
  volunteer pedophile trackers
  (www.perverted-justice.com).
          Montreal pedophile dad
          sentenced to 15 years
►   A Montreal man convicted of sexually assaulting his two-
    year-old daughter and posting pictures of the crime on the
    internet has been sentenced to 15 years in prison.

►   At Monday's sentencing, Quebec Court Judge Dominique
    Wilhelmy said the 32-year-old man has shown no remorse
    and is incapable of displaying empathy. Wilhelmy said that
    just a month before his arrest, the man had thousands of
    images of child pornography on his computer. She said the
    pictures of his daughter will be on the web for a very long
    time.
► http://www.cbc.ca/canada/story/2005/11/02/pedo
    phile051102.html
      “Things aren’t taken as seriously here
         as they are in English Canada.“
The police are doing
little to monitor the
pedophile scene in
montreal , says one
expert.




  http://www.cyberpress
  e.ca/assets/pdf/CP741
  517.PDF
           Canadian websites called a
               'pedophile haven'
May. 23 2007 8:39 AM ET
►   A Washington-state based web site that promotes "girl-
    oriented pedophilia" was shut down by a U.S. web carrier
    earlier this year but has re-emerged thanks to a provider
    based in Montreal.

►   The site itself said its primary purpose is "to promote
    association, friendship; and legal, non-sexual, consensual
    touch between men and prepubescent girls."

►   "They are literally instructing other pedophiles what they can and can't
    do in order to evade the law. Can you suck the toe of a child or can
    you french kiss a child? These are the kind of topics that they speak
    of."
http://www.ctv.ca/servlet/ArticleNews/story/CTVNe
  ws/20070523/child_websites_070523/20070523
Frostys Computers
Predator “Shopped” at
     myspace.com
William Warren Greico, 42, first
approached the girl after he saw
her posting on myspace.com in
August. Billing himself as a man named "Tyler,"
the Seminole High School English teacher sent
his picture to the girl and a message asking if
she'd like to be friends.
Detectives arranged a sting after Greico
suggested that he and the girl meet at an
undisclosed location
                Man Delivers
              Live Rape Video
►A  local man who went on the Internet and offered
 live video of himself having sex with a 3-year-old
 girl is behind bars, police say. Paul A. Kraft has
 been charged with two counts of rape and one
 count of pandering sexually oriented material
 involving a minor.
          The Perfect Victim

► Ideal age: 11-14
► No or little parental involvement
► No definite bedtime
► Can be away from home without anyone
  knowing where he/she is
► Has exclusive use of the computer in a
  private area
    Is Your Child’s Information
             Online?
► Data  mining training course entitled “Advanced
  Internet Research and Intelligence” is online
► Visit www.htcia.org > Archived Webcasts
► Registration is free
    www.google.com
    www.myfamily.com
    www.zoominfo.com
    www.alltheweb.com
    www.zabasearch.com
                   Personal Web Pages
      30   (Millions of Visitors)
      25              26.7

      20

      15                                                                 2004
                                11.1                                     2005
      10                                      7.9
            4.9                         5.8
       5
                                                      <1     1.5
       0
            MySpace      Facebook        Xanga       Friendster
                            N/A
These personal web sites can be shopping grounds for predators. Kids release a
tremendous amount of personal information such as their school information, hobbies,
best friends’ names and nicknames, IM screen names, family pets, favorite teams and
often quite a bit of sexual detail about themselves. Check out
http://www.albumoftheday.com
         Technophilia

Term defined by Detective James
McLaughlin, Keene County Police
Department


“Persons using the
computer to engage in
sexual deviance”
             Cyber Child Sex Offender
                   Terminology
Travelers       those who manipulate or coerce kids to
                meet them in person for sexual
                purposes

Collectors      those involved in collecting child
                pornography

Manufacturers     those who create child pornography
                on any type of medium (all
                manufacturers are collectors)

Chatters        those presenting themselves as
                trustworthy individuals in chat sessions
              Six Steps to Luring

Based loosely on the MISSING Game available
online at http://www.livewwwires.com.
   1.   Just Like You - Befriending
   2.   Making the offer
   3.   Incriminating evidence
   4.   Contact – the “honeymoon phase”
   5.   Guilt and threats as coercion
   6.   The truth emerges
                Groomers
► Most Internet luring instances begin with
 the process of ‘grooming’ – forming a
 trusting bond with the child. There are
 several types of groomers including:
   Romantic groomers
   Aggressive groomers
   Monetary / status groomers
          Befriending Techniques
► Chat   room discussions
      Portrays same age, same likes, same dislikes
      Portrays age-typical awkwardness
      Begins to share some secrets

► Telephone - predators will want to talk on the phone. Just to
  make sure it’s a child talking

► Email - Predator may want the child’s email so they can email them
  offline, and send them stuff, Fantasy statements


► Webcamming


► Verbal   Chat on Internet (Microphone) / Skype
           Chat Room Tools
► MSN Messenger
► ICQ (“I seek you”)
► AOL Instant Messenger
► Yahoo! Messenger & Yahoo Chat
► mIRC (many Internet Relay Chat)



    Recommendation: Tracking Teresa from
    NetSmartz (www.netsmartz.org)
          Tracking Theresa !
 How much info can someone find in just 20
 minutes ?

► http://www.netsmartz.org/resources/reallife
 .htm
            Predator Profiles
► http://www.ci.keene.nh.us/police/offender1.htm
 General Internet Safety Tips
1. Place the computer in a central location
   in the home, not in the kid’s room.
2. Learn who your kids are chatting with
   online (take the “don’t talk to strangers”
   message into the digital world).
3. Define your personal standard regarding
   your child’s privacy.
4. Become familiar with chatting and
   search tools used by your kids.
          Advice for Parents
   - Detective James McLaughlin, Child Sexual Abuse
     and Exploitation, Keene Police Department


1. Know who is most “at risk.”

2. Set up an agreement with your child
   about computer use (hours, access to
   chat lines, revealing personal
   information / photographs)
           Advice for Parents

3. Don’t rely solely on software to
   block/filter content.

4. Let your child know that reporting
   unwanted or suspicious solicitations
   won’t lead to restrictions on computer
   use.
          Advice for Parents

5. Know that restricting communications to a
   specific list of friends may not guarantee
   safe communications.

6. Be aware of restrictions at other
   computer locations – school, library,
   friends’ homes.
         Advice for Parents

7. Look for the warning signs of offender
   manipulation – secretive behavior,
   histories being deleted, unexplained
   telephone charges, hang-up calls,
   unexpected mail, indications that the
   home is under surveillance.

8. Know how to monitor Internet use in a
   variety of ways.
     Monitoring and Restricting
           Internet Use

► Internet Explorer’s Content Advisor
► Content Protect, NetNanny, CYBERsitter,
  CyberPatrol, Cyber Sentinel, FilterPak, Cyber
  Snoop, Safe Keeper, etc.
► Single Password
► Cache and history
► Warning : www.zensur.freerk.com Tells how to
  bypass content filtering.
            www.NetSmartz.org

Some Resouces !

►   Created by the National
    Center for Missing and
    Exploited Children (NCMEC)

      Age-grouped materials for Kindergarten
      through High School
      Age-grouped pledge sheets for
      online use

►   (see www.netsmartz.org/education/ut/)
            www.NetSmartz.org

► Julie's Journey: Julie left home for three weeks
  with a convicted murderer she had developed a
  relationship with online.

► Amy's   Choice: At 15, Amy left home to meet in
  person with a man she first met online. You can
  also read "Amy's Story" as told by her mother.

► Tracking   Teresa: Even though Teresa has tried
  not to reveal personal information online, she’s left
  enough clues that she could find herself in danger.
        www.missingchildren.ca

► The  Missing Children's Network
    Canada
    (NetSmartz was created by the NCMEC)

► Online safety quiz for adults and children
► Online terminology listing


►   For any questions or concerns, please contact
    the following departments:
          The Missing Children's
            Network Canada
►   To Register a Missing Child: search@missingchildren.ca

►   Prevention & Education Services: prevention@missingchildren.ca

►   Host a Fundraising Event: events@missingchildren.ca

►   Corporate Opportunities and Sponsorships:
    development@missingchildren.ca

►   To Make a Donation or for Tax Receipt Information:
    accounting@missingchildren.ca

►   Volunteer Opportunities: volunteers@missingchildren.ca

►   General Information: info@missingchildren.ca
               www.iSafe.org

► Designated as a non-profit and formed in
 1998 to bring internet safety and education
 to the youth of the US
   Classroom curriculum
   Community outreach
   Youth empowerment program
   Visible in all 50 states
   “To Catch a Predator Series”
Dateline NBC Presents

► http://www.msnbc.msn.com/id/10912603/
        What To Do Now
► Download  and review the presentation
 material available online at
 http://www.ethicalhackerguy.ca/kids

► Register for and take the online course
 “Advanced Internet Research and
 Intelligence” at www.htcia.org – use
 the techniques to perform
 reconnaissance on your child
               Thank You
  If you have received a course survey form,
  please fill it out and return it to the presenter

http://www.ethicalhackerguy.ca
http://www.hellomynameisterry.ca

eMail : jedi31337@gmail.com

				
DOCUMENT INFO
Shared By:
Categories:
Stats:
views:97
posted:4/20/2011
language:English
pages:80